[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

[debian-users:32009] Forward: [SECURITY] [DSA 119-1] ssh channel bug



sshã®ã‚»ã‚­ãƒ¥ãƒªãƒ†ã‚£ãƒ›ãƒ¼ãƒ«ãŒè©±é¡Œã«ãªã£ã¦ã„ã¾ã™ãŒã€potatoã®ssh㯠(ãƒãƒ¼ã‚¸ãƒ§
ン1.2.3ã®ãŸã‚) ã“ã®å½±éŸ¿ã‚’å—ã‘る心é…ã¯ãªã„ ã¨ã„ã†ã‚¢ãƒŠã‚¦ãƒ³ã‚¹ãŒå‡ºã•ã‚Œã¾ã—ãŸã€‚

ã‚‚ã¡ã‚ã‚“ã€woody ã‚„ sidã€ã‚ã‚‹ã„ã¯è‡ªåˆ†ã§ã‚³ãƒ³ãƒ‘イルã—㦠2.0〜3.0.2 ã«è©²å½“
ã™ã‚‹ ssh ã®ãƒãƒ¼ã‚¸ãƒ§ãƒ³ã‚’使ã£ã¦ã„ã‚‹æ–¹ã¯æ—©æ€¥ã«ã‚¢ãƒƒãƒ—グレードを行ã£ã¦ãã 
ã•ã„。

--- Begin Message ---
-----BEGIN PGP SIGNED MESSAGE-----

- ----------------------------------------------------------------------------
Debian Security Advisory                                 security@debian.org
http://www.debian.org/security/                                Michael Stone
March 7, 2002
- ----------------------------------------------------------------------------

Package: openssh
Vulnerability: local root exploit, remote client exploit
Debian-specific: no

Joost Pol <joost@xxxxxxx> reports that OpenSSH versions 2.0 through 3.0.2
have an off-by-one bug in the channel allocation code. This vulnerability
can be exploited by authenticated users to gain root privilege or by a
malicious server exploiting a client with this bug.

Since Debian 2.2 (potato) shipped with OpenSSH (the "ssh" package)
version 1.2.3, it is not vulnerable to this exploit. No fix is required
for Debian 2.2 (potato).

The Debian unstable and testing archives do include a more recent OpenSSH
(ssh) package. If you are running these pre-release distributions you
should ensure that you are running version 3.0.2p1-8, a patched version
which was added to the unstable archive today, or a later version.

- ----------------------------------------------------------------------------
For apt-get: deb http://security.debian.org/ stable/updates main
For dpkg-ftp: ftp://security.debian.org/debian-security dists/stable/updates/main
Mailing list: debian-security-announce@lists.debian.org

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.0.6 (GNU/Linux)
Comment: For info see http://www.gnupg.org

iQCVAwUBPIkgYw0hVr09l8FJAQE3bwQApAYLyouyfSxma4sxnqk74xb/jVd324/U
demNb7wTp6fVkLUYKC6d0HTFYtFhlnTh9qHpmQRG0nUE9FgdoB0NVgBjpBEXAxU8
8wkX84dfAYLCZBBF6R01XozJFb+rWVoSAGUunMgtnEWXnAa8ZNkwstVX4X38HoVf
BHkicmvH6Fg=
=vFPj
-----END PGP SIGNATURE-----


-- 
To UNSUBSCRIBE, email to debian-security-announce-request@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmaster@lists.debian.org


--- End Message ---